[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: (ITS#8701) account usability control for password less logins



This is a multi-part message in MIME format.
--------------6CCE37E19DCAC5B8EF15AF2F
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit

Please disregard the previous workaround proposal, it was incorrect. The 
corrected workaround proposal:

The idea is to determine the account/password state on the client side 
(since there's no easy way to get the server to provide the state 
without using the user's password). This was accomplished in a prototype 
by retrieving the /pwdPolicySubentry/, the policy setting, other 
operational attributes such as /pwdChangedTime/, /pwdAccountLockedTime/, 
/pwdFailureTime/, and /pwdGraceUseTime/. These were used to determine 
the account/password state.

Is this reasonable and safe to do?


On 08/02/2017 07:31 AM, Ben Chang wrote:
> Question about a proposed workaround:
>
> Would it be possible to use slapo-ppolicy to set the pwdPolicySubentry 
> attribute for each user to provide the desired 
> 1.3.6.1.4.1.42.2.27.9.5.8 control response (see 
> http://ldapwiki.com/wiki/Account%20Usability%20Request%20Control), 
> i.e., can pwdPolicySubentry be used supply the sub-entry and related 
> operational attributes needed to validate users for password-less logins?
>


--------------6CCE37E19DCAC5B8EF15AF2F
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <p>Please disregard the previous workaround proposal, it was
      incorrect. The corrected workaround proposal:</p>
    <p> The idea is to determine the account/password state on the
      client side (since there's no easy way to get the server to
      provide the state without using the user's password). This was
      accomplished in a prototype by retrieving the <i>pwdPolicySubentry</i>,
      the policy setting, other operational attributes such as <i>pwdChangedTime</i>,
      <i>pwdAccountLockedTime</i>, <i>pwdFailureTime</i>, and <i>pwdGraceUseTime</i>.
      These were used to determine the account/password state.</p>
    <p>Is this reasonable and safe to do? </p>
    <br>
    <div class="moz-cite-prefix">On 08/02/2017 07:31 AM, Ben Chang
      wrote:<br>
    </div>
    <blockquote type="cite"
      cite="mid:52bb394d-41f9-746e-28d9-200370b94fbe@oracle.com">Question
      about a proposed workaround:
      <br>
      <br>
      Would it be possible to use slapo-ppolicy to set the
      pwdPolicySubentry attribute for each user to provide the desired
      1.3.6.1.4.1.42.2.27.9.5.8 control response (see
      <a class="moz-txt-link-freetext" href="http://ldapwiki.com/wiki/Account%20Usability%20Request%20Control";>http://ldapwiki.com/wiki/Account%20Usability%20Request%20Control</a>),
      i.e., can pwdPolicySubentry be used supply the sub-entry and
      related operational attributes needed to validate users for
      password-less logins?
      <br>
      <br>
    </blockquote>
    <br>
  </body>
</html>

--------------6CCE37E19DCAC5B8EF15AF2F--